Thursday, August 24, 2017

Tag: Intelligence

Why Are the Media Taking the CIA’s Hacking Claims at Face Value?

Despite the CIA’s uninspiring record for the past 70 years, the media are defending the agency for all it’s worth. In 1977, Carl Bernstein published an exposé of a CIA program known as Operation Mockingbird, a covert program involving, according to Bernstein, “more than 400 American journalists who in the...

Top U.S. spy agency has not embraced CIA assessment on Russia hacking

The overseers of the U.S. intelligence community have not embraced a CIA assessment that Russian cyber attacks were aimed at helping Republican President-elect Donald Trump win the 2016 election, three American officials said on Monday. While the Office of the Director of National Intelligence (ODNI) does not dispute the CIA's...

The CIA and the Press: When the Washington Post Ran the CIA’s Propaganda Network

Last week, the Washington Post published a scurrilous piece by a heretofore obscure technology reporter named Craig Timberg, alleging without the faintest evidence that Russian intelligence was using more than 200 independent news sites to pump out pro-Putin and anti-Clinton propaganda during the election campaign. Under the breathless headline, “Russian propaganda effort...

Donald Trump Hopes to Abolish Intelligence Chief Position, Reverse CIA Reforms

Donald Trump's national security team is discussing plans to dismantle the Office of the Director of National Intelligence, the organization that was created in response to the 9/11 attacks, according to an adviser to the president-elect and a former senior intelligence official. The news comes as the current director...

Trump National Security Team Includes Surprising Names

With many mainstream Republican defense experts having denounced his candidacy, President-elect Donald Trump is assembling a team of lesser known national security figures to staff his transition team, intelligence and military officials told NBC News. A number of prominent Republican former security officials have made it clear through words or...

The Internet of Things Is a Cyberwar Nightmare

But we can still prevent our household appliances from becoming an army of malicious computer zombies out to destroy the web. The world got a glimpse of the future last month when a large-scale cyberattack prevented access to hundreds of key websites, including Twitter, the online New York Times, and...

Intelligence agencies are running al-Qaeda camps in North Africa  –  UN consultant

New evidence points to a Western cover-up of Algerian state sponsorship of Islamist jihadists, to protect oil and gas interests. An unpublished report by a government advisor and UN consultant, obtained exclusively by INSURGE intelligence, accuses Western and Algerian security services of complicity in al-Qaeda terrorist activity across North Africa. The...

CIA Preparing for Possible Cyber Strike Against Russia

The Obama administration is contemplating an unprecedented cyber covert action against Russia in retaliation for alleged Russian interference in the American presidential election, U.S. intelligence officials told NBC News. Current and former officials with direct knowledge of the situation say the CIA has been asked to deliver options to the...

Yahoo secretly scanned customer emails for U.S. intelligence

Yahoo Inc last year secretly built a custom software program to search all of its customers' incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter. The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts...

Top U.S. general: Unwise to share intelligence with Russia on Syria

The top U.S. general told Congress on Thursday it would be unwise to share intelligence with Russia and stressed that would not be one of the military's missions if Washington and Moscow were to ever work together against Islamist militants in Syria. The United States and Russia clinched a ceasefire...

Pentagon: US watched armed group in Syria for 2 days before airstrike that may...

WASHINGTON – The U.S. military watched an armed group in eastern Syria for at least two days before launching an airstrike on Saturday that was halted after Russia reported the attack hit Syrian regime forces, a U.S. Central Command spokesman said Tuesday. The Pentagon has launched a formal investigation into...

UK Parliament report details how NATO’s 2011 war in Libya was based on lies

British investigation: Gaddafi was not going to massacre civilians; Western bombing made Islamist extremism worse. A new report by the British Parliament shows that the 2011 NATO war in Libya was based on an array of lies. “Libya: Examination of intervention and collapse and the UK's future policy options,” an investigation...

As Russia reasserts itself, U.S. intelligence agencies focus anew on the Kremlin

U.S. intelligence agencies are expanding spying operations against Russia on a greater scale than at any time since the end of the Cold War, U.S. officials said. The mobilization involves clandestine CIA operatives, National Security Agency cyberespionage capabilities, satellite systems and other intelligence assets, officials said, describing a shift in...

Every Move You Make

This summer, at 1:51 p.m. on Saturday, June 11, an unearthly roar shattered the afternoon quiet along the Florida coast. On Cape Canaveral, liquid fuel surged through the thick aluminum veins of a Delta IV Heavy rocket nearly as tall as the U.S. Capitol. Two million pounds of thrust in three symmetrical boosters fired the engines, sending the craft hurtling over the Atlantic Ocean into the heavens.

New Docs Show How the NSA Used the Iraq War to Build its Surveillance...

Newly released internal NSA missives from the early days of the Iraq war show how quickly the agency’s priorities shifted from providing wartime intelligence to coalition troops to being a “pervasive” part of the “intelligence-driven” global war on terror. The documents, which have surfaced for the first time, outline how...

Inside Menwith Hill: The NSA’s British Base at the Heart of U.S. Targeted Killing

The narrow roads are quiet and winding, surrounded by rolling green fields and few visible signs of life beyond the occasional herd of sheep. But on the horizon, massive white golf ball-like domes protrude from the earth, protected behind a perimeter fence that is topped with piercing razor wire. Here, in the heart of the tranquil English countryside, is the National Security Agency’s largest overseas spying base.

BAE Systems Sells Internet Surveillance Gear to United Arab Emirates

A Danish subsidiary of British defense contractor BAE Systems is selling an internet surveillance package to the government of the United Arab Emirates, a country known for spying on, imprisoning, and torturing dissidents and activists, according to documents obtained by Lasse Skou Andersen of the Danish newspaper Dagbladet Information. The...

This malware sold to governments could help them spy on iPhones, researchers say

Many people assume their iPhones are secure, but new research sent Apple scrambling to fix vulnerabilities that left users at risk. Spyware relying on three previously unknown, or “zero-day,” flaws in Apple’s iOS mobile operating system for years made it possible for governments to take over victims' phones by tricking them into...

The Million Dollar Dissident: NSO Group’s iPhone Zero-Days used against a UAE Human Rights...

Today Apple released security updates for Desktop Safari and Mac OS X. These updates patch the Trident vulnerabilities that identified in this report for desktop users. The Trident vulnerabilities used by NSO could have been weaponized against users of non iOS devices, including OSX. We encourage all Apple users to install...

Cisco Exploit Leaked in NSA Hack Modifies to Target Latest Version of Firewalls

Recently released NSA exploit from "The Shadow Brokers" leak that affects older versions of Cisco System firewalls can work against newer models as well. Dubbed ExtraBacon, the exploit was restricted to versions 8.4.(4) and earlier versions of Cisco's Adaptive Security Appliance (ASA) – a line of firewalls designed to protect...

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly...

Mysterious Group Hacks The NSA

The latest hack revealed over the weekend has nothing to do with the Democratic Party or George Soros, and instead a mysterious hacker group by the name “The Shadow Brokers” claims to have hacked the Equation Group - a government cyberattack hacking group associated with the NSA, and released...

Powerful NSA hacking tools have been revealed online

Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers. A cache of hacking tools with code...

NSA Hacked? Shadow Brokers Crew Claims Compromise Of Surveillance Op

Has the NSA just been hacked? Security experts speaking with FORBES think it’s possible, after a group published malware and attack code allegedly belonging to the Equation Group, a crew linked to the US intelligence agency. But while many believe the leak looks legitimate, the hackers could have pulled...

Shadow Brokers: NSA Exploits of the Week

When your boy Serge is in charge of Cyber Attribution #DNCHack #InfoSec cc @Trevornoahpic.twitter.com/88prA2AjD5 — @msuiche Today an unknown group called Shadow Brokers started an auction after claiming they hacked Equation Group (NSA entity named like that by Kaspersky, and believed to be the author of Stuxnet & Flame) here: https://theshadowbrokers.tumblr.com/. The Tumblr...

The Raid: In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner

Tony Fullman is a middle-aged former tax man and a pro-democracy activist. But four years ago, a botched operation launched by New Zealand spies meant he suddenly found himself deemed a potential terrorist — his passport was revoked, his home was raided, and he was placed on a top-secret National Security Agency surveillance list.

Iraqi Insurgents Stymied the NSA and Other Highlights from 263 Internal Agency Reports

Early in the fight against al Qaeda in Afghanistan and insurgents in Iraq, the National Security Agency was blindsided by enemy fighters’ frequent use of rudimentary wireless communications devices known as “high–powered cordless phones,” according to documents among 263 published today by The Intercep.

Privacy Scandal Haunts Pokemon Go’s CEO

Within two weeks of its release last month, Pokemon Go, the augmented reality gaming sensation, surpassed, by one estimate, Twitter, Facebook, and Netflix in its day-to-day popularity on Android phones. Over on Apple devices, the game was downloaded more times in its first week than any app that came before it. The suddenly vast scale...

This Company Has Built a Profile on Every American Adult

Every move you make. Every click you take. Every game you play. Every place you stay. They’ll be watching you. Forget telephoto lenses and fake mustaches: The most important tools for America’s 35,000 private investigators are database subscription services. For more than a decade, professional snoops have been able to...

Can This Israeli Startup Hack Your Phone?

Many computer-security companies trumpet their skills and accomplishments. Some take another tack altogether, like NSO Group. This Israeli startup no longer operates a website. But it has peddled its wares to the Mexican government, gotten on the radar of Central Intelligence Agency officials and recently was bought by an American private equity firm. A...

Article Filter Options